Open Access
REVIEW
Homomorphic Encryption for Machine Learning Applications with CKKS Algorithms: A Survey of Developments and Applications
1 Key Laboratory of Information and Network Security, Engineering University of the PAP, Xi’an, 710086, China
2 Key Laboratory of CT&C, Engineering University of the PAP, Xi’an, 710086, China
3 Science and Technology on Communication Security Laboratory (CETC 30), Chengdu, 610041, China
* Corresponding Author: Xu An Wang. Email:
(This article belongs to the Special Issue: Advancements and Challenges in Artificial Intelligence, Data Analysis and Big Data)
Computers, Materials & Continua 2025, 85(1), 89-119. https://doi.org/10.32604/cmc.2025.064346
Received 12 February 2025; Accepted 03 July 2025; Issue published 29 August 2025
Abstract
Due to the rapid advancement of information technology, data has emerged as the core resource driving decision-making and innovation across all industries. As the foundation of artificial intelligence, machine learning(ML) has expanded its applications into intelligent recommendation systems, autonomous driving, medical diagnosis, and financial risk assessment. However, it relies on massive datasets, which contain sensitive personal information. Consequently, Privacy-Preserving Machine Learning (PPML) has become a critical research direction. To address the challenges of efficiency and accuracy in encrypted data computation within PPML, Homomorphic Encryption (HE) technology is a crucial solution, owing to its capability to facilitate computations on encrypted data. However, the integration of machine learning and homomorphic encryption technologies faces multiple challenges. Against this backdrop, this paper reviews homomorphic encryption technologies, with a focus on the advantages of the Cheon-Kim-Kim-Song (CKKS) algorithm in supporting approximate floating-point computations. This paper reviews the development of three machine learning techniques: K-nearest neighbors (KNN), K-means clustering, and face recognition-in integration with homomorphic encryption. It proposes feasible schemes for typical scenarios, summarizes limitations and future optimization directions. Additionally, it presents a systematic exploration of the integration of homomorphic encryption and machine learning from the essence of the technology, application implementation, performance trade-offs, technological convergence and future pathways to advance technological development.Keywords
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools